Our great sponsors
-
Are you trying to avoid copying the file from the /tmp directory after it is processed? As part of my work at Pangea.cloud, I developed as Firebase Extension, https://github.com/pangeacyber/pangea-extensions-firebase/tree/main/storage-file-intel , that scans files for malicious behavior after a user uploads a file. If the file is deemed dangerous, it gzips it and moves the .zip file to a /malicious folder in Cloud Storage. This all works automatically because the processing function is set as a trigger to cloud storage events. Are you using triggers?
-
If you want to try the Extension, check out this tutorial. Accepting user uploads is the use case we developed the Extension. Depending on your use case, and if you want to share your app's processing capabilities with other Firebase developers, you might want to consider building it into a Firebasse Extensions
-
Appwrite
Appwrite - The Open Source Firebase alternative introduces iOS support . Appwrite is an open source backend server that helps you build native iOS applications much faster with realtime APIs for authentication, databases, files storage, cloud functions and much more!
Related posts
- Firebase Extension to automatically scan files uploaded by user for malicious behavior
- Integrating with Firebase with Pangea's security services
- Authenticate your Firebase users with Huawei ID
- How to Build a Private Messaging Chat App with React-Native (Signal Clone)
- Firecode: Fast and efficient collection traversers for Firestore